Pollozek, Silvan (Author)
Jan-Hendrik Passoth (Author)
Data infrastructures for the Frontex joint operations are often only temporary and thus in need of being built up and removed easily, adjustable to changing constellations of security actors, and adaptable to new situations. They need to work through flaws, gaps, and inconsistencies. Still, they fabricate data used for the re-identification of migrants, police investigations, situational pictures, or risk analysis and lead to the intensification of security practices of Frontex. This is accomplished by data infrastructures that are provisional by design. People and forms are used as provisional gateway to interconnect various installed bases of national police and coast guard authorities, informal communication channels and ‘other’ entry fields proliferate around partially standardized classification systems, and ongoing coordination and repair tame and validate the proliferation of data. With this, the data infrastructure of joint border operations hints to a mode of Europeanization that is neither supranational nor intergovernmental. Instead of centralized administrations or fully integrated information systems, it aims for partial harmonization through interconnecting loosely information systems and institutional ecologies of national and EU agencies alike. This causes issues of accountability and requires an analysis that takes the mundane socio-technical conditions of knowledge production into account.
...MoreArticle Nina Amelung; Vasilis Galis (2023) Border control technologies: Introduction. Science as Culture (pp. 323-343).
Article
Bruno Oliveira Martins;
(2023)
Security knowledges: Circulation, control, and responsible research and innovation in EU border management
(/p/isis/citation/CBB687707247/)
Article
Nina Amelung;
Vasilis Galis;
(2023)
Border control technologies: Introduction
(/p/isis/citation/CBB332203986/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/p/isis/citation/CBB775086796/)
Book
Ana Muñiz;
(2022)
Borderland Circuitry: Immigration Surveillance in the United States and Beyond
(/p/isis/citation/CBB304288480/)
Book
Josh Lauer;
Kenneth Lipartito;
(2021)
Surveillance Capitalism in America
(/p/isis/citation/CBB401959068/)
Article
Rebecca J. Hester;
(2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology
(/p/isis/citation/CBB548068287/)
Article
Vasiliki Makrygianni;
Vasilis Galis;
(2023)
Practices of radical digital care: Towards autonomous queer migration
(/p/isis/citation/CBB803018064/)
Book
Iván Chaar López;
(2024)
The Cybernetic Border: Drones, Technology, and Intrusion
(/p/isis/citation/CBB407005585/)
Article
Laura Lambert;
(2023)
Contested promises: Migrants’ material politics vis-à-vis the humanitarian border in Niger
(/p/isis/citation/CBB085788037/)
Book
William Walters;
Charles Heller;
Lorenzo Pezzani;
(2022)
Viapolitics: Borders, Migration, and the Power of Locomotion
(/p/isis/citation/CBB123888452/)
Article
Caroline Lucas;
(March 2019)
The Democracy Lag: Updating Electoral Law and the Need for a Digital Bill of Rights [Opinion]
(/p/isis/citation/CBB142512373/)
Book
Parenti, Christian;
(2003)
The Soft Cage: Surveillance in America, from Slave Passes to the Patriot Act
(/p/isis/citation/CBB000830945/)
Article
Henri Boullier;
Emmanuel Henry;
(2022)
Toxic Ignorance: How Regulatory Procedures and Industrial Knowledge Jeopardise the Risk Assessment of Chemicals
(/p/isis/citation/CBB183545703/)
Article
Brook Manville;
Josiah Ober;
(March 2019)
In Search of Democracy 4.0: Is Democracy as We Know It Destined to Die?
(/p/isis/citation/CBB867447434/)
Book
Groebner, Valentin;
(2007)
Who Are You? Identification, Deception, and Surveillance in Early Modern Europe
(/p/isis/citation/CBB000954255/)
Article
Griset, Pascal;
Schafer, Valérie;
(2011)
Hosting the World Wide Web Consortium for Europe: From CERN to INRIA
(/p/isis/citation/CBB001210212/)
Article
Krebs, Stefan;
(2012)
Standardizing Car Sound---Integrating Europe? International Traffic Noise Abatement and the Emergence of a European Car Identity, 1950--1975
(/p/isis/citation/CBB001210227/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/p/isis/citation/CBB181826170/)
Article
Katrin M. Kämpf;
(2020)
Pedophilia Screening in Technosecurity Culture The Construction of Dangerous Sub-populations in the Name of Security
(/p/isis/citation/CBB009060974/)
Article
Karin Bijsterveld;
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989
(/p/isis/citation/CBB388750124/)
Be the first to comment!